🛡️ Suricata Rules
IDS/IPS rules generated from our threat intelligence. Deploy these rules in your Suricata installation to detect and block known threats.
Available Rule Files
Rules are updated hourly and organized by date
-
Loading rules...
How to Use Suricata Rules
Installation:
# Download latest rules wget https://www.check-the-sum.fr/feeds/suricata/suricata_$(date +%d_%m_%Y).rules # Copy to Suricata rules directory sudo cp suricata_*.rules /etc/suricata/rules/ # Update suricata.yaml to include the rules sudo nano /etc/suricata/suricata.yaml # Reload Suricata sudo suricata-update sudo systemctl restart suricata
Automation:
#!/bin/bash # Add to crontab: 0 * * * * /path/to/update-suricata-rules.sh wget -q https://www.check-the-sum.fr/feeds/suricata/suricata_$(date +%d_%m_%Y).rules -O /tmp/cts-rules.rules if [ -s /tmp/cts-rules.rules ]; then cp /tmp/cts-rules.rules /etc/suricata/rules/checkthesum.rules suricatasc -c reload-rules fi